Home » Which commands in terminal clean drive space no apt-get clean type commands work. won’t download in Software Center nor update! not CCleaner [closed]

Which commands in terminal clean drive space no apt-get clean type commands work. won’t download in Software Center nor update! not CCleaner [closed]

Solutons:


The commands apt-get clean and autoclean are not primarily meant to free disk space. These commands are meant to work on the software packages that are installed on your computer.

  • Now, if you want to know what did fill up your harddrive start with the command sudo df -m. This will tell you on which partition and in which directory the most disk space is used in MB.

    # sudo df -m
    S.Ficheros                    bloques de 1M Usados Disponibles Uso% Montado en
    /dev/dm-0                            366198  91120      275078  25% /
    udev                                     10      0          10   0% /dev
    tmpfs                                   766      9         757   2% /run
    tmpfs                                  1915      1        1915   1% /dev/shm
    tmpfs                                     5      1           5   1% /run/lock
    tmpfs                                  1915      0        1915   0% /sys/fs/cgroup
    /dev/sda1                               228     47         169  22% /boot
    /dev/mapper/laptop--user1-home        102350  13286       89065  13% /home
    tmpfs                                   383      1         383   1% /run/user/1000
    
  • Use the command sudo du -m --max-depth=2 within one Directory to find out which subdirectories have the biggest size in MB. This will take you to the Directory that filled up your hard disk.
    like: sudo du -m --max-depth=2 /home.
    Which will tell you which Directory of the User Account hold the most disk space in MB.

    # sudo du -m --max-depth=1 /home
    12425   /home/user1
    817     /home/user2
    13242   /home
    

    Here we see that ‘user1’ is using the most of the 13242 MB occupied on the /home partition

  • Once you have found out what did fill up your hard disk you will be able to decide best what is to do to free disk space. Like perhaps: Deleting user files or uninstalling software.

Related Solutions

Where do you store your personal private GPG key?

I like to store mine on paper. Using a JavaScript (read: offline) QR code generator, I create an image of my private key in ASCII armoured form, then print this off. Note alongside it the key ID and store it in a physically secure location. Here's some that...

Provide subjectAltName to openssl directly on the command line

As of OpenSSL 1.1.1, providing subjectAltName directly on command line becomes much easier, with the introduction of the -addext flag to openssl req (via this commit). The commit adds an example to the openssl req man page: Example of giving the most common...

Tracing the location of a mobile IP from an email

The problem with this scenario is that emails are typically not sent from the device itself, but from a central service. In order to do what you want, the investigators would have to make a few hops: to the email service (gets the user account details,...

Is there any reason to disable paste password on login?

There is no substantial security benefit to disallowing pasted passwords; on the contrary it is likely to weaken security by discouraging the use of password managers to generate and autofill randomized passwords. While some password managers are capable of...

Why would you not permit Q or Z in passwords?

It's a leftover from the time when keypads didn't have the letters Q and Z. Security-wise, there's no reason. It's just because of old systems. To clarify: You used to be able to enter your password over the phone. Some phones didn't have the letters Q or Z,...

Why did I have to wave my hand in front of my ID card?

Given that this identification was likely performed according to German law, this request was to conform with BaFin Circular 3/2017 which demands (in their non-binding English translation): Any substitution/manipulation of parts or elements of the identity...

Why is Math.random() not designed to be cryptographically secure?

I was one of the implementers of JScript and on the ECMA committee in the mid to late 1990s, so I can provide some historical perspective here. The JavaScript Math.random() function is designed to return a floating point value between 0 and 1. It is widely...

Is Telegram secure?

TL;DR: No, Telegram is not secure. I'd like to ignore the comparison to WhatsApp because WhatsApp does not advertise itself as a "secure" messaging option. I'd like to instead focus on whether Telegram is secure. Telegram's security is built around their home...

Is “the oft-cited XKCD scheme […] no longer good advice”?

The Holy War I think you will find that the correct way to generate passwords could start a holy war where each group thinks the other is making a very simple mathematical mistakes or missing the point. If you get 10 computer security professionals in a room...

All 0s (zeros) in a bank card’s CVC code

Alexander O'Mara provided a correct answer, but having worked in a hotel that was using booking.com I believe I can provide additional information about the reason that CVV was denied. Every day the hotel I worked in would receive around 50 bookings, a quarter...

Is single quote filtering nonsense?

You should implement input validation as a defense-in-depth method. So input validation should not be your primary defense against SQL injection, that should be prepared statements. As an additional defense you should restrict the allowed inputs. This should...

SSL3 “POODLE” Vulnerability

What is the Poodle vulnerability ? The "Poodle" vulnerability, released on October 14th, 2014, is an attack on the SSL 3.0 protocol. It is a protocol flaw, not an implementation issue; every implementation of SSL 3.0 suffers from it. Please note that we are...

Can ads on a page read my password?

Nothing prevents ads from reading your passwords. Ads (or any other script like analytics or JavaScript libraries) have access to the main JavaScript scope, and are able to read a lot of sensitive stuff: financial information, passwords, CSRF tokens, etc. Well,...